Our Blog

“The IoT will be a multi-trillion industry by 2020. For that forecast to materialize, some of that money will flow in the pockets of entrepreneurs who can clear the hurdles that threaten to rob the IoT from reaching its full potential.”

US Department of Transportation releases report with findings from Safety Pilot for V2V conducted in 2012. Report is titled: “Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application.”

Report cites the lack of research into cyber-attacks, an area of concern for consumers:

“Senate Commerce Committee Chairman Jay Rockefeller asked, ‘As our cars become more connected — to the Internet, to wireless networks, with each other, and with our infrastructure — are they at risk of catastrophic cyber-attacks?’ To date, NHTSA’s V2V research has not included research specific to this issue…”

“The agency may also wish to explore the availability and appropriateness of measures to mitigate cyber-attack risks specific to V2V technologies (if any exist).”

“In the June 5, 2013, poll released by the Alliance mentioned above, it was also found that consumers, when questioned about self-driving vehicles, expressed concerns about cyber-security (i.e., 81 percent about a computer hacker controlling the car), companies collecting data from the self-driving cars (i.e., 75 percent), and companies sharing this information with the government (i.e., 70 percent).”

“A number of United States banks, including JPMorgan Chase and at least four others, were struck by hackers in a series of coordinated attacks this month…”

“The hackers infiltrated the networks of the banks, siphoning off gigabytes of data, including checking and savings account information, in what security experts described as a sophisticated cyberattack.”

“For those unfamiliar with it, the Internet of Things (also known as M2M or machine to machine) refers to an expanding network of interconnected internet-enabled devices. Driven by miniaturisation, the affordability of components such as cheap Bluetooth sensors, and the growing ubiquity of technologies such as Wi-Fi, it is now possible to connect devices in a way that would never have previously been thought possible. While still in its “early adopter” infancy, some estimates suggest that by 2020 there will be in the region of 50bn IoT devices – all talking with one another on a constant basis.”

“What do you see being the big ethical questions involved with this?”
“Security is a big one.” – Ian Ferguson, vice president at ARM

“Trying to control employees use of USB-equipped devices to transfer data is another ineffective security measure, Gilmore said. Identifying USB devices is challenging, he said, noting that the technology is found in common items like pens and watches. ‘Data is ubiquitous, easy to transfer,’ he said. ‘How do you keep them from using USB? You don’t.'”

Any digital enterprise must protect its own infrastructure and information against compromise. However, the “internet of everything”, mobile devices, cloud applications, and BYOD (bring your own device) are changing the stakes on what it means to be secure. Is your enterprise prepared for the next generation of attacks, including low-level protocol attacks and APT (advanced persistent threat)? This panel will explore the implications of recent major compromises of the NSA and other private sector companies on the digital enterprise. In addition, the panel will explore why CIOs need to constantly evaluate new technologies and put policies and procedures in place to combat against increasingly sophisticated cyber attacks. Finally, the panel will explore the implications of introducing technology and policy changes on organization culture and budgets.

“For a host of companies, the Target breach was a pivotal event that permanently altered the way they approach data security. Many CIOs say they’re receiving more support, but they say the trade-off is that they’re facing increased scrutiny from their CEOs and other executives. If their fortress walls fall to hackers, their jobs will be on the line.”

…”Getting on the cover of The Wall Street Journal in some cyberattack is a CIO’s worst nightmare,” he says. “They’re the bodyguard and the linchpins of the companies they work for more today than ever before, because of the amount of data that’s out there.”

…”I think CIOs are getting more respect,” Scannell says. “They’re winning a seat at the table. But along with that, we have a heightened security risk, so they’re under pressure to do something about it.”

Gigavation

Gigavation develops cybersecurity technologies for consumers, corporations, and public-sector. Its solutions secure computers, mobile devices, networks, and industrial control systems against attacks and data loss. Gigavation was founded by MIT and Harvard graduates.

Work with us

Our team has grown to encompass a wide variety of passionate cyber defenders and brilliant minds.